Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things

被引:0
|
作者
Al-Aqrabi, Hussain [1 ]
Johnson, Anju P. [1 ]
Hill, Richard [1 ]
机构
[1] Univ Huddersfield, Ctr Ind Analyt, Huddersfield HD1 3DH, W Yorkshire, England
关键词
cryptographic protocol; dynamic partial reconfiguration; physically unclonable functions; cloud computing; analytics; security; multiparty interactions; Internet of Things; PHYSICAL UNCLONABLE FUNCTIONS; CLOUD; SECURITY; MANAGEMENT; CLASSIFICATION; ARCHITECTURE; FUTURE;
D O I
10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00049
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid development of various emerging technologies such as cloud computing and the Internet of Things (IoT) presents significant security and privacy challenges. In particular, complex and challenging applications involving various business parties have the requirement to delegate access control mechanisms securely to one or more parties, who in turn can govern methods that enable multiple other parties to be authenticated in relation to the services that they wish to consume. Moreover, modern integrated design and manufacturing follows a business model where different third-party vendors provide hardware, software, and manufacturing services, making it hard to ensure the trustworthiness of the entire process. The emergence of IoT has led to our use of Field Programmable Gate Array (FPGA) devices with Dynamic Partial Reconfiguration (DPR) abilities, which allows for modifications to the hardware implemented to undergo changes and incorporate dynamic addition/deletion of access using security protocols. We use, Physically Unclonable Functions (PUF), cryptographic hardware primitive which are based on a physical system having easy to evaluate, hard to predict and manufacturer resistant properties in developing a security protocol. In this paper, we combine the concepts of hardware security through PUFs and hardware evolution through DPR in providing dynamic secure multiparty authentication system.
引用
收藏
页码:21 / 28
页数:8
相关论文
共 50 条
  • [1] Distributed Multiparty Key Management for Efficient Authentication in the Internet of Things
    Mahmood, Zahid
    Ullah, Ata
    Ning, Huansheng
    IEEE ACCESS, 2018, 6 : 29460 - 29473
  • [2] Certificate-based authentication using hardware cryptographic devices
    Dolezel R.
    Pedersen J.M.
    Advances in Intelligent and Soft Computing, 2011, 102 : 519 - 531
  • [3] Hardware based Two-Factor User Authentication for the Internet of Things
    Gurabi, Mehdi Akbari
    Alfandi, Omar
    Bochem, Arne
    Hogrefe, Dieter
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 1081 - 1086
  • [4] Hardware-Accelerated Blockchain-Based Authentication for the Internet of Things
    Santos, Joanne Marie, V
    Pascua, Jeanne Eunice, V
    Tiglao, Nestor Michael C.
    COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET, 2022, 427 : 283 - 295
  • [5] Dynamic authentication for intelligent sensor clouds in the Internet of Things
    Al-Aqrabi, Hussain
    Manasrah, Ahmed M.
    Hill, Richard
    Shatnawi, Mohammed Q.
    Daoud, Mohammad Sh
    Alkhzaimi, Hoda
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2003 - 2021
  • [6] Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things
    Alshaeri, Abdulaziz
    Younis, Mohamed
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 152 - 158
  • [7] Dynamic Authentication Protocol Using Self-Powered Timers for Passive Internet of Things
    Afifi, M. H.
    Zhou, Liang
    Chakrabartty, Shantanu
    Ren, Jian
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2927 - 2935
  • [8] Innovative Dynamic SRAM PUF Authentication for Trusted Internet of Things
    Urien, Pascal
    2020 16TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2020,
  • [9] Multifactor User Authentication Mechanism Using Internet of Things
    Santhi, S. G.
    Rao, M. Kameswara
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 496 - 502
  • [10] Leveraging Secure Multiparty Computation in the Internet of Things
    von Maltitz, Marcel
    Carle, Georg
    MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2018, : 508 - 510